Suivre
Robin Gandhi
Titre
Citée par
Citée par
Année
Dimensions of cyber-attacks: Cultural, social, economic, and political
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 30 (1), 28-38, 2011
2162011
Ontology-based active requirements engineering framework
SW Lee, RA Gandhi
12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005
1042005
Building problem domain ontology from security requirements in regulatory documents
SW Lee, R Gandhi, D Muthurajan, D Yavagal, GJ Ahn
Proceedings of the 2006 international workshop on Software engineering for …, 2006
822006
Requirements engineering visualization: a survey on the state-of-the-art
JR Cooper, SW Lee, RA Gandhi, O Gotel
2009 Fourth International Workshop on Requirements Engineering Visualization …, 2009
672009
Building decision support problem domain ontology from natural language requirements for software assurance
SW Lee, D Muthurajan, RA Gandhi, D Yavagal, GJ Ahn
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
402006
Using semantic templates to study vulnerabilities recorded in large software repositories
Y Wu, RA Gandhi, H Siy
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
382010
Social, Political, Economic, and Cultural
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 1932 (4529/11), 2011
362011
An integrated framework for control system simulation and regulatory compliance monitoring
W Mahoney, RA Gandhi
International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011
292011
Visual analytics for requirements-driven risk assessment
RA Gandhi, SW Lee
Second International Workshop on Requirements Engineering Visualization (REV …, 2007
272007
Certification process artifacts defined as measurable units for software assurance
SW Lee, RA Gandhi, GJ Ahn
Software Process: Improvement and Practice 12 (2), 165-189, 2007
242007
Common criteria requirements modeling and its uses for quality of information assurance (QoIA)
DS Yavagal, SW Lee, GJ Ahn, RA Gandhi
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 130-135, 2005
232005
Building a social dimensional threat model from current and historic events of cyber attacks
AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu
2010 IEEE Second International Conference on Social Computing, 981-986, 2010
212010
Towards a requirements-driven workbench for supporting software certification and accreditation
SW Lee, RA Gandhi, S Wagle
Third International Workshop on Software Engineering for Secure Systems …, 2007
212007
Discovering multidimensional correlations among regulatory requirements to understand risk
RA Gandhi, SW Lee
ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 1-37, 2011
202011
Security requirements driven risk assessment for critical infrastructure information systems
SW Lee, RA Gandhi, G Ahn
Proceedings of the Symposium on Requirements Engineering for Information …, 2005
202005
Authentication bypass and remote escalated I/O command attacks
R Grandgenett, W Mahoney, R Gandhi
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
192015
Empirical results on the study of software vulnerabilities (NIER track)
Y Wu, H Siy, R Gandhi
Proceedings of the 33rd International Conference on Software Engineering …, 2011
182011
Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment
RA Gandhi, SW Lee
15th IEEE International Requirements Engineering Conference (RE 2007), 231-240, 2007
182007
Exploitation of Allen Bradley’s implementation of EtherNet/IP for denial of service against industrial control systems
R Grandgenett, R Gandhi, W Mahoney
9th International Conference on Cyber Warfare and Security 2014, 58-65, 2014
162014
Open data standards for open source software risk management routines: An examination of SPDX
R Gandhi, M Germonprez, GJP Link
Proceedings of the 2018 ACM International Conference on Supporting Group …, 2018
152018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20